Vous êtes sur la page 1sur 4

THE ENEMY WITHIN

FIVE EMPLOYEE HABITS THAT THREATEN YOUR BUSINESS

INTRODUCTION
Most reports on data protection and business continuity highlight the need for
vigilance against external threats. You read a lot about the negative business
impacts of hurricanes, tornadoes, earthquakes, fires and malware, but a different
class of threats are far more prevalent – those created by your own employees.

*Source: CRN Magazine

As seen in the CRN study above, employee error ranks as the number one cause of
business interruptions. There is also a large human factor in most other IT downtime
incidents; for example it takes just one employee clicking on a shady link to initiate a
ransomware attack.

Your data protection and business continuity strategy must be able to handle both
external and internal threats. Here are five examples of employee data protection
challenges and guidance on how your business continuity solution should handle
them.
EMPLOYEE THREATS

#1 – Premature Code without risking production quickly and easily roll back most dangerous aspect of
Launchers environments. By using a CDM software to the last functioning insider threats is the fact
According to the CRN report, approach to testing, any issues version. However, preventing that the access and activities
the number two cause of with software patches will bad software from being are coming from trusted
business interruptions is be discovered during testing deployed in the first place individuals, and thus will
software errors. These and ensure the corrected will reduce negative impacts fly below the radar of many
includes software patches that version will run as planned in on business processes and detection technologies.
introduce more issues then production. Using CDM for employee productivity. One important tool to limiting
they fix, upgrades that break testing may reduce the need the potential negative impact
links to integrated systems, for additional storage and of an employee is to limit
#2 – Malicious Employees
systems that hang, and dedicated infrastructure to spin their access to only the
uncontrolled restarts. While up test labs. The frequency of malicious
data they need to do their
employees purposefully
“We have software vendor releases are
marketed as being production harming a company are
job. Data protection tools
Systems with advanced with Distributed Enterprise
difficult to measure as
met the ready, you never really know
how they will perform until they
CDM have the ability to do organizations are reluctant
Management (DEM) allow
backup administrators to
security scans on backups to disclose these events.
are installed in your unique
enemy production environment.
before bringing up a test /
dev environments. You should
It is an embarrassment to
grant role-based management
rights to limited content in
admit bad hiring practices
The most prudent approach to the enterprise’s collection
and he is keeping software issues from
always follow your security
best-practices, but you may
or that relations with an
individual have been allowed
of backups. DEM enables
causing business interruptions find that certain machines managed self-service, freeing
us.” is to test all changes prior to are too impacted to scan for
to degrade to the point of
them wanting to harm their
IT from that work, and limits
being released onto production viruses in production. CDM with visibility to data from other
company. A recent analyst
systems. Companies should integrated security capabilities parts of the organization.
report indicated that a major
utilize data protection allows you to perform this triggering event for employees
- Pogo, 1970 appliances that offer copy
data management (CDM).
function before building a test to maliciously delete Office The most common employee
environment. This additional 365 data is a company merger attack is to intentionally
CDM allows administrators to layer of security will minimize or acquisition. Today, with fully delete software, files, emails
instantly create isolated, fully malware and virus infections automated business processes and SharePoint folders
featured test and development and make no demands on your employees with overly broad prior to their termination.
environments from backups. production environment. security privileges are in a Organizations can protect
These test/dev environments
position to do great harm by themselves from this form of
can then be made available
Being realistic, some bad code deleting large volumes of data attack by using data protection
over the network for software
will still slip through so organi- or purposefully introducing systems that backup the
version testing, analytics,
zations still need the ability to corrupting software. The entire software stack, (server
patch tests, or what/if analysis
settings, data bases on detection radar and increase time. #5 – Sloppy Employees New
remote servers, and operating the odds that a ransom will be There is a set of employees This last category of
systems) as well as have paid. Newly developed artificial that literally save every shred challenging employees is just ransomware
infinite and remote data intelligence (AI) runs during of data, email, file, doc or about all of us. There are few
retention. Recovery can then every backup, analyzes the PPT they come across in the of us that haven’t inadver- variants
be just a few clicks away. randomness of file changes belief that there is a slight
(not just change rates) and chance they may need it
tently, or in a fit of organizing
frenzy, lost or intentionally
operate
identifies backups infected by again in the future. Keeping
#3 – Ransomware Clickers
ransomware. Upon detection, all this data on spinning
deleted important files.
Almost every IT professional
in stealth
On the list of leading causes email and dashboard alerts
of lost business productivity should be sent immediately
disks is expensive. Long term
data storage in the cloud
can tell you about calls they
receive declaring that “An
mode,
is virus / malware attacks. to administrators, and all
All employees are potential suspected backups flagged
is particularly effective in
preserving data files against
important file is missing and
have no idea of where it went
seeking
ransomware clickbait. with icons to prevent
Corporations should conduct attempted recoveries using
local failures and inadvertent
deletion. The cloud can store
or who could have lost it!”
Lost file recovery is one of
critical
employee training to educate infected files.
their workforce on how to
data at a lower cost per GB
than on-premises solutions.
the most common tasks and files, and
can chew up many hours of IT
identify and avoid potential
infections, however it only #4 – Data Hoarders Organizations of all sizes need time. encrypting
their backup appliances to
takes one bad click to launch Dealing with data growth
an attack. is difficult. The storage
have seamless integration
Organizations need to at a slower
with the cloud so archiving
capacity of servers needs ensure their data protection
to support highly virtualized
and data compliance can be
appliances support easy file rate to stay
An additional problem is that programmed and continue
environments, with potentially recovery; it should take less
new ransomware variants
dozens of applications running
with no human interaction.
than five minutes to recover under the
are emerging every day.
at the same time. Purchasing
Your ransomware protection
SANs or NAS devices is Organizations must also
a lost file, from login to full
restoration. The UI should be
detection
needs to continue to evolve
to keep up. Enterprise data
expensive, especially for small
and mid-sized organizations.
ensure that their data
protection appliances are
easy and intuitive enough that
any member of IT can recover
radar and
protection appliances should
have the ability to quickly
Industry and government
compliance requirements say
scalable to handle larger
storage volumes as the
a lost file without having to
consult a manual or receive
increase the
and accurately identify
ransomware activity as
that some data types need
to be preserved and for 7-10
business grows. When
considering a new data
special training. Quickly
addressing these interruptions
odds that a
part of every backup. New
ransomware variants operate
years or even forever. On
average organizations can
protection appliance be sure
and forecast the data volumes
will enable IT to focus on ransom will
more pressing organizational
in stealth mode, seeking
critical files, and encrypting at
expect data volumes to grow
10% per year, compounding
you will need to protect over
the life of the product.
projects. be paid.
a slower rate to stay under the
into TB-sized data sets over
CONCLUSION
Now that you have heard about threats to your business posed by your employees,
is it time ensure that you can deal with them as part of your data protection and
business continuity strategy? You may be interested in seeing how Unitrends is
deploying these capabilities for Simpler, Smarter IT.

Other Items that May Interest You:

TEST YOUR THREAT IQ

Unitrends increases uptime and confidence in a world in which IT professionals must do more with less. Unitrends
leverages high-availability hardware and software engineering, cloud economics, enterprise power with consumer-
grade design, and customer-obsessed support to natively provide all-in-one enterprise backup and continuity. The
result is a “one throat to choke” set of offerings that allow customers to focus on their business rather than backup.
Learn more by visiting unitrends.com or follow us on LinkedIn and Twitter @Unitrends.

*CRN http://www.crn.com/slide-shows/storage/240006796/8-surprising-disaster-recovery-stats.htm/pgno/0/7

unitrends.com
PART# WP-2071-ENG-A-the-Enemy-Within

Vous aimerez peut-être aussi